[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[libreplanet-discuss] The Intel ME/AMT/vPro vulnerability, mitigation an

From: Daniel Pocock
Subject: [libreplanet-discuss] The Intel ME/AMT/vPro vulnerability, mitigation and airport scans
Date: Mon, 7 Aug 2017 07:37:14 -0400
User-agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1

The recent AMT/vPro exploit[1] has helped shine a light on this
problem.  Has anybody seen any evidence that anything is changing
though, either in what vendors are offering or in terms of how companies
buy technology?

Over the last few years, people have been trained to separate their
laptops for security scanning at airports.  More recently, some airports
are opening/waking the laptops before they go through the x-ray: while
ME doesn't require a computer to be on, maybe some
vulnerabilities/back-doors can only be exploited while it is awake?

It is not hard to imagine some of these x-ray machines may be designed
to exploit vulnerabilities like that which was recently acknowledged by

Has anybody seen any evidence that this is taking place systematically?

Then again, would there be anything special about exploiting them at
airports?  Would a chain of fast food or coffee stores "enhance" their
wifi access points to access the ME capabilities of laptops brought into
their premises or has anybody noticed if that is already happening?




reply via email to

[Prev in Thread] Current Thread [Next in Thread]